[1] W. Bender, D. Gruhl, N. Morimoto, A. Lu, -
“Techniques for Data Hiding”, IBM Systems
Journal, Vol 35, Nos 3&4, 1996.
[2] Zhicheng Ni, Yun-Qing Shi, Nirwan Ansari, and
Wei Su, “Reversible Data Hiding”, IEEE
Transactions On Circuits And Systems For Video
Technology, Vol. 16, No. 3, March 2006.
[3] Anagha Markandey, “A Review On Data Hiding
Techniques In Encrypted Images”, International
Journal of Computer Trends and Technology (IJCTT)
– volume 4 Issue10 – Oct 2013.
[4] W. Puech, M. Chaumont and O. Strauss.“A
Reversible Data Hiding Method for Encrypted
Images”, "IS&T/SPIE Electronic Imaging 2008 -
Security, Forensics, Steganography, and
Watermarking of Multimedia Contents, San Jose,
CA : United States".
[5] Weiming Zhang, Biao Chen, and Nenghai Yu,
“Improving Various Reversible Data Hiding Schemes
Via Optimal Codes for Binary Covers”, IEEE
Transactions on Image Processing, Vol. 21, No. 6,
June 2012.
[6] Xinpeng Zhang, “Separable Reversible Data Hiding in
Encrypted Image”, IEEE Transactions OnInformation Forensics And Security, Vol. 7, No. 2,
April 2012.
[7] Kede Ma, Weiming Zhang, Xianfeng Zhao, Nenghai
Yu, and Fenghua Li,“Reversible Data Hiding in
Encrypted Images by Reserving Room Before
Encryption”, IEEE Transactions On Information
Forensics And Security, Vol. 8, No. 3, March 2013.
[8] Dalel Bouslimi, Gouenou Coatrieux, Michel Cozic,
And Christian Roux, Fellow, IEEE, “A Joint
Encryption/Watermarking System For Verifying The
Reliability Of Medical Images”, IEEE Transactions
On Information Technology In Biomedicine, Vol. 16,
No. 5, September 2012.
[9] Min Wu, Member, IEEE, and Bede Liu, Fellow,
IEEE, “Data Hiding in Binary Image for
Authentication and Annotation”, IEEE Transactions
On Multimedia, Vol. 6, No. 4, August 2004
[10] P. Radhadevi, P. Kalpana, Assistant Professors, Dept
Of CA, “Secure Image Encryption Using AES”
IJRET , Volume 1 Issue 2,Oct 2012.